User accounts accessed by attackers due to flaw in “view as” feature @ Facebook, Inc.

In September 2018, the social media company admitted to a serious vulnerability (which was described as a flaw in Facebook’s “view as” feature) that allowed hackers to gain access to accounts and even third-party apps that used Facebook for login to g...

CEO scam attack results in large financial loss @ Ubiquiti Networks Inc.

In August 2015, the US networking firm disclosed that cyber attackers stole USD $46.7 million using a business email compromise attack in which attackers pretend to be executives at the victim company to initiate unauthorised international wire transf...

Software company hacked and 38 million accounts breached @ Adobe Systems Incorporated

The company initially reported that hackers had stolen nearly 3 million encrypted customer credit card records, plus login data for an unknown number of user accounts. Later the company said the attackers had accessed IDs and encrypted passwords for ...

Business disruption at chocolate manufacturer due to global cyber attack @ Cadbury and Mondelez International, Inc.

In June 2017, the world's second largest confectionery company was affected by the global ransomware attack called NotPetya which was an untargeted campaign without a specific intended victim. Many of the impacted companies were infected after downlo...

Mortgage industry insider steals and sells records of 2.5 million customers @ Bank of America and 3 more...

At one point the biggest data theft by a financial insider, this employee entered company offices each Sunday for at least two years and copied 20,000 customer records each time using the only company computer that still had the USB port enabled. ...

Browse visualisations from our proprietary data set

Sectors

Visualise cyber events by industry sector.

View

Net Costs

Visualise net costs by industry sector.

View

Global Cyber Event Taxonomy

Visualise the key attributes we capture.

View

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as bad actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...